...
首页> 外文期刊>IEEE Transactions on Computers >Branch Prediction Attack on Blinded Scalar Multiplication
【24h】

Branch Prediction Attack on Blinded Scalar Multiplication

机译:关于盲法标量乘法的分支预测攻击

获取原文
获取原文并翻译 | 示例
           

摘要

In recent years, performance counters have been used as a side channel source to monitor branch mispredictions, in order to attack cryptographic algorithms. However, the literature considers blinding techniques as effective countermeasures against such attacks. In this article, we present the first template attack on the branch predictor. We target blinded scalar multiplications with a side-channel attack that uses branch misprediction traces. Since an accurate model of the branch predictor is a crucial element of our attack, we first reverse-engineer the branch predictor. Our attack proceeds with a first online acquisition step, followed by an offline template attack with a template building phase and a template matching phase. During the template matching phase, we use a strategy we call Deduce & Remove, to first infer the candidate values from templates based on a model of the branch predictor, and subsequently eliminate erroneous observations. This last step uses the properties of the target blinding technique to remove wrong guesses and thus naturally provides error correction in key retrieval. In the later part of this article, we demonstrate a template attack on Curve1174 where the double-and-add always algorithm implementation is free from conditional branching on the secret scalar. In that case, we target the data-dependent branching based on the modular reduction operations of long integer multiplications. Such implementations still exist in open source software and can be vulnerable, even if top level safeguards like blinding are used. We provide experimental results on scalar splitting, scalar randomization, and point blinding to show that the secret scalar can be correctly recovered with high confidence. Finally, we conclude with recommendations on countermeasures to thwart such attacks.
机译:近年来,性能计数器已被用作监控分支错误预测的侧通道源,以攻击加密算法。然而,文献认为致盲技术是针对这种攻击的有效对策。在本文中,我们介绍了分支预测器上的第一个模板攻击。我们针对盲目的标量乘法,并使用分支错误规范迹线的侧通道攻击。由于分支预测器的准确模型是我们攻击的关键因素,我们首先向工程师反向工程师。我们的攻击与第一个在线采集步骤进行,然后使用模板构建阶段和模板匹配阶段的离线模板攻击。在模板匹配阶段期间,我们使用我们称之为推断和删除的策略,首先将基于分支预测器的模型从模板推断候选值,并随后消除错误观察。最后一步使用目标致盲技术的属性来消除错误的猜测,从而自然地在密钥检索中提供纠错。在本文的后期部分,我们演示了关于曲线1174的模板攻击,其中双和添加始终算法实现是秘密标量的条件分支。在这种情况下,我们基于长整数乘法的模块化减少操作来瞄准数据相关分支。这种实现仍然存在于开源软件中,并且即使使用像致盲的顶级安全性,也可以易受攻击。我们在标量分裂,标量随机化和点致盲地提供实验结果,以表明秘密标量可以正确地恢复。最后,我们与关于挫败此类袭击的对策的建议结束。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号